{"id":1962,"date":"2022-10-18T11:53:09","date_gmt":"2022-10-18T11:53:09","guid":{"rendered":"https:\/\/cwatch.comodo.com\/blog\/?p=1962"},"modified":"2022-10-18T13:35:24","modified_gmt":"2022-10-18T13:35:24","slug":"what-is-an-ssdp-ddos-attack","status":"publish","type":"post","link":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/","title":{"rendered":"What is an SSDP DDoS Attack?"},"content":{"rendered":"<h2>Instant Analysis of a DDoS Attack Using SSDP Protocol (Simple Service Discovery Protocol)<\/h2>\n<p>A Simple Service Discovery Protocol (SSDP) attack is a reflection-based <a href=\"https:\/\/cwatch.comodo.com\/website-security\/distributed-denial-of-service-attack.php\">distributed denial-of-service (DDoS) attack<\/a> that can exploit <strong>Universal Plug and Play (UPnP)<\/strong> networking protocols to send a huge amount of traffic to a targeted victim, overpowering the target\u00e2\u20ac\u2122s infrastructure and take their web resource offline.<\/p>\n<h3>How does an SSDP Protocol Attack Work?<\/h3>\n<p>The <strong>SSDP protocol<\/strong> is generally used to allow UPnP devices to broadcast their existence to other devices on the network. For instance, when a UPnP printer is linked to a network and it receives an IP address, the printer advertises its services to computers on the network by sending a message to a special IP address known as a multicast address. This multicast address is then responsible for telling all the computers on the network about the new printer. After receiving the discovery message, a computer requests the printer to get a complete list of its services. The printer then responds directly back to the computer with that list. An <strong>SSDP Protocol attack<\/strong> exploits that final request for services by directing the device to respond to the targeted victim.<\/p>\n<h3>Steps of a Typical SSDP DDoS Attack<\/h3>\n<p>Here\u00e2\u20ac\u2122s what happens during a typical <strong>SSDP DDoS attack:<\/strong><\/p>\n<ul>\n<li>The attacker performs a scan, looking for plug-and-play devices that can be used as amplification factors.<\/li>\n<li>As the attacker discovers networked devices, they develop a list of all the devices that respond.<\/li>\n<li>The attacker makes a UDP packet with the spoofed IP address of the target victim.<\/li>\n<li>The attacker uses a botnet to send a spoofed discovery packet to each plug-and-play device with a request for as much data as possible by setting specific flags, particularly <strong>ssdp:rootdevice or ssdp:all<\/strong>.<\/li>\n<li>Each device sends a reply to the targeted victim with data up to about 30 times larger than the attacker&#8217;s request.<\/li>\n<li>The target receives a huge volume of traffic from all the devices and becomes overwhelmed, possibly resulting in <strong>denial-of-service to legitimate traffic<\/strong>.<\/li>\n<\/ul>\n<h3>Prevent SSDP Protocol DDoS Attacks Using Comodo cWatch<\/h3>\n<p>Comodo cWatch is a <strong>Managed Security Service<\/strong>, ideal for websites and applications, that provides a Web Application Firewall (WAF) provisioned over a Secure <strong>Content Delivery Network (CDN)<\/strong>. cWatch is fully managed by a Cyber Security Operation Center (CSOC) of always-available certified security analysts and is powered by a Security Information and Event Management (SIEM) system that can leverage data from more than 85 million endpoints to detect and mitigate threats even before they occur.<\/p>\n<p>Comodo cWatch also provides malware detection scanning, preventive methods, and removal services to enable organizations to proactively protect their business and brand reputation from infections and attacks. cWatch Web is available with a <a href=\"https:\/\/cwatch.comodo.com\/waf-protection.php\" target=\"_blank\" rel=\"noopener noreferrer\">WAF<\/a> capable of eliminating application vulnerabilities and protecting web applications and websites against advanced attacks including but not limited to <strong>DDoS, Cross-Site Scripting, and SQL Injection<\/strong>. Combined with services like vulnerability scanning, malware scanning, and automatic virtual patching and hardening engines, the Comodo WAF provides robust security that is completely managed for customers as part of the <strong>Comodo cWatch Web solution<\/strong>.<\/p>\n<p><strong>Key Features Offered by cWatch:<\/strong><\/p>\n<p>    \u00e2\u20ac\u00a2 <strong>Secure Content Delivery Network<\/strong> (CDN): A global system of distributed servers to enhance the performance of web applications and websites<\/p>\n<p>    \u00e2\u20ac\u00a2 <strong>Malware Monitoring and Remediation<\/strong>: Detects malware, provides the methods and tools to remove it, and prevents future malware attacks<\/p>\n<p>    \u00e2\u20ac\u00a2 <strong>Cyber Security Operations Center<\/strong> (CSOC): A team of always-on certified cybersecurity professionals providing <strong>24x7x365<\/strong> surveillance and remediation services<\/p>\n<p>    \u00e2\u20ac\u00a2 <strong>Web Application Firewall <\/strong>(WAF): Powerful, real-time edge <a href=\"https:\/\/cwatch.comodo.com\/waf\/website-protection.php\" title=\"Website Protection\">protection for websites<\/a> and web applications providing advanced security, filtering, and intrusion protection<\/p>\n<p>    \u00e2\u20ac\u00a2 <strong>Security Information and Event Management<\/strong> (SIEM): Advanced intelligence capable of leveraging current events and data from 85M+ endpoints and 100M+ domains<\/p>\n<p>    \u00e2\u20ac\u00a2 <strong>PCI Scanning<\/strong>: Enables service providers and merchants to stay in compliance with PCI DSS<\/p>\n<p><a class=\"get_started_cta\" href=\"https:\/\/cwatch.comodo.com\/onboard-buyer-journey\/?track=9679&#038;af=9679\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" alt=\"website-security\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/cwatch-website-security.jpg\" style=\"float:left\" \/><\/a><\/p>\n<div class=\"clearfix\"> <\/div>\n<p><strong>Related Resource<\/strong><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/cheap-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Cheap Content Delivery Network<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/best-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Best CDN Providers<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/pay-as-you-go-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Pay as You Go CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/free-cdn\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Free CDN<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-vulnerability-scanner-tools\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Website Vulnerability Scanner<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>Website Backup<\/b><\/a><\/strong><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-status-checker.php\" target=\"_blank\" rel=\"noopener noreferrer\"><b>Website Status<\/b><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/website-security\/ddos-protection-solutions.php\" target=\"_blank\" rel=\"noopener noreferrer\"><b>DDoS Protection Solution<\/b><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/ddos-protection\/protect-from-ddos.php\" target=\"_blank\" rel=\"noopener noreferrer\"><b>Protect from DDoS<\/b><\/a><\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/wordpress-security.php\" rel=\"noopener noreferrer\" target=\"_blank\"><strong>WordPress Security<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instant Analysis of a DDoS Attack Using SSDP Protocol (Simple Service Discovery Protocol) A Simple Service Discovery Protocol (SSDP) attack is a reflection-based distributed denial-of-service (DDoS) attack that can exploit Universal Plug and Play (UPnP) networking protocols to send a huge amount of traffic to a targeted victim, overpowering the target\u00e2\u20ac\u2122s infrastructure and take their [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1282,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[1422,1432],"class_list":["post-1962","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attack","tag-ssdp-ddos-attack","tag-what-is-an-ssdp-ddos-attack"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is an SSDP DDoS Attack? | What is SSDP Protocol?<\/title>\n<meta name=\"description\" content=\"What is an SSDP DDoS Attack? Learn what is SSDP protocol - Simple Service Discovery Protocol is used for discovery of Plug and Play (UPnP) devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is an SSDP DDoS Attack? | What is SSDP Protocol?\" \/>\n<meta property=\"og:description\" content=\"What is an SSDP DDoS Attack? Learn what is SSDP protocol - Simple Service Discovery Protocol is used for discovery of Plug and Play (UPnP) devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"cWatch Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-18T11:53:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-18T13:35:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/what-is-a-ddos-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"906\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seoindia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\"},\"headline\":\"What is an SSDP DDoS Attack?\",\"datePublished\":\"2022-10-18T11:53:09+00:00\",\"dateModified\":\"2022-10-18T13:35:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/\"},\"wordCount\":666,\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/what-is-a-ddos-attack.jpg\",\"keywords\":[\"SSDP DDoS Attack\",\"What is an SSDP DDoS Attack\"],\"articleSection\":[\"Cyber Attack\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/\",\"name\":\"What is an SSDP DDoS Attack? | What is SSDP Protocol?\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/what-is-a-ddos-attack.jpg\",\"datePublished\":\"2022-10-18T11:53:09+00:00\",\"dateModified\":\"2022-10-18T13:35:24+00:00\",\"description\":\"What is an SSDP DDoS Attack? Learn what is SSDP protocol - Simple Service Discovery Protocol is used for discovery of Plug and Play (UPnP) devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#primaryimage\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/what-is-a-ddos-attack.jpg\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/what-is-a-ddos-attack.jpg\",\"width\":906,\"height\":300,\"caption\":\"What Is A DDoS Attack and How Does DDoS work?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cwatch.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is an SSDP DDoS Attack?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"name\":\"cWatch Blog\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\",\"name\":\"cWatch Blog\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"width\":106,\"height\":52,\"caption\":\"cWatch Blog\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/x.com\/seoindia\"],\"url\":\"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is an SSDP DDoS Attack? | What is SSDP Protocol?","description":"What is an SSDP DDoS Attack? Learn what is SSDP protocol - Simple Service Discovery Protocol is used for discovery of Plug and Play (UPnP) devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/","og_locale":"en_US","og_type":"article","og_title":"What is an SSDP DDoS Attack? | What is SSDP Protocol?","og_description":"What is an SSDP DDoS Attack? Learn what is SSDP protocol - Simple Service Discovery Protocol is used for discovery of Plug and Play (UPnP) devices.","og_url":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/","og_site_name":"cWatch Blog","article_published_time":"2022-10-18T11:53:09+00:00","article_modified_time":"2022-10-18T13:35:24+00:00","og_image":[{"width":906,"height":300,"url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/what-is-a-ddos-attack.jpg","type":"image\/jpeg"}],"author":"Admin","twitter_card":"summary_large_image","twitter_creator":"@seoindia","twitter_misc":{"Written by":"Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#article","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/"},"author":{"name":"Admin","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d"},"headline":"What is an SSDP DDoS Attack?","datePublished":"2022-10-18T11:53:09+00:00","dateModified":"2022-10-18T13:35:24+00:00","mainEntityOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/"},"wordCount":666,"publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/what-is-a-ddos-attack.jpg","keywords":["SSDP DDoS Attack","What is an SSDP DDoS Attack"],"articleSection":["Cyber Attack"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/","url":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/","name":"What is an SSDP DDoS Attack? | What is SSDP Protocol?","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#primaryimage"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/what-is-a-ddos-attack.jpg","datePublished":"2022-10-18T11:53:09+00:00","dateModified":"2022-10-18T13:35:24+00:00","description":"What is an SSDP DDoS Attack? Learn what is SSDP protocol - Simple Service Discovery Protocol is used for discovery of Plug and Play (UPnP) devices.","breadcrumb":{"@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#primaryimage","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/what-is-a-ddos-attack.jpg","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/what-is-a-ddos-attack.jpg","width":906,"height":300,"caption":"What Is A DDoS Attack and How Does DDoS work?"},{"@type":"BreadcrumbList","@id":"https:\/\/cwatch.comodo.com\/blog\/cyber-attack\/what-is-an-ssdp-ddos-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwatch.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is an SSDP DDoS Attack?"}]},{"@type":"WebSite","@id":"https:\/\/cwatch.comodo.com\/blog\/#website","url":"https:\/\/cwatch.comodo.com\/blog\/","name":"cWatch Blog","description":"Just another WordPress site","publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cwatch.comodo.com\/blog\/#organization","name":"cWatch Blog","url":"https:\/\/cwatch.comodo.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","width":106,"height":52,"caption":"cWatch Blog"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","caption":"Admin"},"sameAs":["https:\/\/x.com\/seoindia"],"url":"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/"}]}},"_links":{"self":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=1962"}],"version-history":[{"count":23,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1962\/revisions"}],"predecessor-version":[{"id":19262,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1962\/revisions\/19262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media\/1282"}],"wp:attachment":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=1962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=1962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=1962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}